Skip to main content
  1. Blog
  2. Article

Amrisha Prashar
on 16 October 2015

Origami Wily Werewolf Competition


In March we held a competition that asked participants to create their best version of a Unicorn Origami to celebrate our design theme for the Ubuntu Phone. With the upcoming launch of 15.10, we’d love to see your best version of Wily Werewolf using your Origami skills.

The following pdf can help you design your creations! Instructions Origami Wily Werewolf

Then all you’ll need to do once complete is:
– Take a photo of your design
– Upload to Twitter
– And use the hashtag #OrigamiWerewolf

A member of our design team will judge the best based on creativity, complexity and design. The deadline is 11:59 on Wednesday 28th October and the winner will receive an Ubuntu E5 Phone! Happy creating.

Terms_and_Conditions_Origami_WilyWerewolf

Related posts


Luci Stanescu
19 May 2026

CVE-2026-46333 (ssh-keysign-pwn) Linux kernel vulnerability mitigations

Ubuntu Article

An information disclosure security vulnerability in the Linux kernel was publicly disclosed on May 15th, 2026. The vulnerability was reported by Qualys and fixed in the mainline Linux kernel tree. A proof-of-concept exploit was published soon after public disclosure. The ID CVE-2026-46333 was assigned, but the vulnerability is also referr ...


Canonical
19 May 2026

Canonical launches Ubuntu Core 26

Canonical announcements Article

Ubuntu Core 26 introduces precise Linux builds, optimized OTA updates, live kernel patching, and enhanced hardware-backed protection for mission-critical deployments. May 19, 2026 Today, Canonical announced the general availability of Ubuntu Core 26, its minimal, immutable operating system with up to 15 years of security maintenance.  Ubu ...


Miha Purg
15 May 2026

Finding the blind spot: How Canonical hunts logic flaws with AI

AI Article

AI is accelerating and improving how security engineers find and fix vulnerabilities. A new tool developed and used at Canonical, called Redhound, has already uncovered three critical logic vunerabilites, paving the way for a more secure software landscape. ...